NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,891 to 1,905 of 3,396 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sutlieff, Lisa; Chelin, Jackie – Journal of Librarianship and Information Science, 2010
This research investigated the importance of user-library trust in ensuring vital freedom of inquiry in academic libraries, exploring its strength through comparison with attitudes towards the National Identity Card Scheme (NICS) within the various libraries of a large UK university. An online survey of students and interviews with librarians…
Descriptors: Trust (Psychology), Academic Freedom, Student Attitudes, Academic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Kregenow, Julia; Rogers, Michael; Constas, Mark – Astronomy Education Review, 2010
We discuss collecting data simultaneously from many different instruments, including both qualitative and quantitative sources. A list of instruments used is provided, and data collection methods are described. Many practical logistical concerns are discussed, warning of potential pitfalls to be avoided. This article is intended to be a practical…
Descriptors: Educational Research, Data Collection, Measures (Individuals), Statistical Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rivero-Mendez, Marta; Dawson-Rose, Carol S.; Solis-Baez, Solymar S. – Qualitative Report, 2010
This study examines healthcare providers' perceptions regarding experiences and factors that contribute to adherent and non-adherent behaviors to HIV treatment among women living with HIV infection in Puerto Rico and describes strategies implemented to improve adherence. Providers' accounts revealed that women with HIV infection are living…
Descriptors: Acquired Immunodeficiency Syndrome (AIDS), Health Services, Social Support Groups, Females
O'Brien, Dan – National Center for Analysis of Longitudinal Data in Education Research, 2008
This research brief describes the legal and operational structure of the Texas longitudinal data system related to recent changes in the Family Educational Rights and Privacy Act of 1974 (FERPA)--which establishes the rights of parents to access their children's educational records and protects the confidentiality of student information--that more…
Descriptors: Privacy, Confidentiality, Student Records, Federal Legislation
Carnevale, Dan – Chronicle of Higher Education, 2008
Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…
Descriptors: Electronic Mail, Information Technology, Professional Services, Internet
Data Quality Campaign, 2012
While states have made tremendous progress building the capacity to collect longitudinal data, developing the systems and practices to tap into P-20W data remains a nascent effort in most states. This primer aims to provide policymakers with information and recommendations to propel states' progress toward using P-20W data to prepare…
Descriptors: Information Dissemination, Knowledge Economy, State Policy, Information Systems
Hussain, Fehmida – International Association for Development of the Information Society, 2012
Web 3.0, termed as the semantic web or the web of data is the transformed version of Web 2.0 with technologies and functionalities such as intelligent collaborative filtering, cloud computing, big data, linked data, openness, interoperability and smart mobility. If Web 2.0 is about social networking and mass collaboration between the creator and…
Descriptors: Foreign Countries, Electronic Learning, Learning Theories, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Childs, Mark; Schnieders, H. Lori; Williams, Gweno – Interactive Learning Environments, 2012
Using virtual worlds as media for learning and teaching gives rise to the potential for many unique ethical problems. Some of these arise due to the nature of the engagement with these virtual worlds, in which the students create a virtual representation, called an avatar, which may enable a sense of embodiment, and hence exposure, within the…
Descriptors: Foreign Countries, Educational Opportunities, Simulated Environment, Self Concept
Peer reviewed Peer reviewed
Direct linkDirect link
Francis-Poscente, Krista; Moisey, Susan Darlene – Journal of Distance Education, 2012
This paper discusses students' experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather…
Descriptors: Foreign Countries, Educational Technology, Web Based Instruction, Electronic Learning
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Gordon, Douglas – National Clearinghouse for Educational Facilities, 2010
Maintaining student health, safety, and welfare is a primary goal for any K-12 school system. If a child becomes sick, is injured, or seems in any other way incapacitated at school, it is the understood responsibility that the school will provide care and, if necessary, contact the parents and direct the child to outside treatment. Beyond that…
Descriptors: Elementary Secondary Education, School Responsibility, School Role, Disadvantaged Youth
Boyle, Rob – ProQuest LLC, 2010
The Family Educational Rights and Privacy Act has sometimes caused confusion among higher education professionals since the legislation was introduced by Senator James Buckley in 1974. Reasons for this confusion range from the fact that it became a law without the usual congressional considerations to the belief that FERPA was never intended to…
Descriptors: Higher Education, Privacy, Safety, Violence
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Lowenthal, Patrick R.; Thomas, David – EDUCAUSE Quarterly, 2010
As online learning continues to grow each year, so do the number of new media and Web 2.0 technologies faculty have at their disposal, yet the majority of online courses remain heavily text-based. Online learning often mirrors the traditional classroom, with a focus on read and write (and at times discuss)--sometimes with good reason. One of the…
Descriptors: Computer Mediated Communication, Technology Uses in Education, Influence of Technology, Electronic Learning
National Forum on Education Statistics, 2013
This document is intended to serve as a practical guide for implementing a teacher-student data link (TSDL) that supports a range of uses at the local, regional, and state levels. The guide addresses the considerations for linking teacher and student data from multiple perspectives, including governance, policies, data components, business rules,…
Descriptors: Data Collection, Data Analysis, Educational Research, Research Utilization
Pages: 1  |  ...  |  123  |  124  |  125  |  126  |  127  |  128  |  129  |  130  |  131  |  ...  |  227